Home »

 
 

Workshop Overview

 

Dr. Oleg Sokolsky (Keynote Speaker)

•Bio: Dr.OlegSokolskyOleg Sokolsky is a Research Professor of Computer and Information Science at the University of Pennsylvania. He received M.Sc. and Ph.D. in Computer Science from St. Petersburg Technical University and Stony Brook University, respectively. His research interests broadly lie in the application of formal reasoning to the development of high-confidence cyber-physical systems. He has worked on multiple large-scale CPS safety and security projects, including DARPA HACMS and ONR RHIMES programs.

•Abstract: Cyber-physical systems (CPS) are characterized by their tight integration of computer-based control and management applications with their physical environments. Such a tight integration brings new security challenges, as the physical environment greatly extends the attack surface of the system. A number of such attacks have emerged recently, highlighting the need for cyber-physical defenses, in addition to conventional cyber-security techniques. At the same time, the tight coupling with the physical environment offers new ways to detect attacks and defend the system, since the attacker is fundamentally constrained by the laws of physics. In this talk, we will discuss emerging cyber-physical threats and resilience measures that mitigate these threats.

 

 

 

Dr. Jianguo Yao

•Bio:Dr.Yao Jianguo Yao obtained his Ph.D degree at Northwestern Polytechnical University in 2010, and was a joint-education Ph.D student at McGill University from 2007 to 2008. He was also a joint Postdoctoral Fellow at Ecole Polyechnique de Montreal and McGill University from 2011 to 2012. In 2011, he worked briefly as an intern researcher at Bombardier Inc. in Canada. In 2015, he worked as a visiting professor at Technische Universität München in Germany. He received the prestigious Alexander von Humboldt Fellowship and PBEEE/Quebec Merit Scholarship for Foreign Students from Quebec Fund for Research on Nature and Technology (FQRNT). Dr. Yao is an Associate Professor at the Shanghai Jiao Tong University (SJTU), Shanghai, China, and he directs the Automatic Computing Group at SJTU. His research interests are cyber-physical systems, virtualization in clouds and industrial big data. He has published more than 50 research papers in major peer-reviewed International journals and top-conference proceedings, including Proceedings of the IEEE, ACM/IEEE Transactions (TPDS, TDSC, TSC, TII, TIE, TSG, TACO, TECS, TSN), RTSS, VLDB, ATC, KDD, INFOCOM, ICDCS, HPDC etc. He has participated in various conferences, and served as Publicity Co-Chairs in the conferences including Middleware 2016, ICAC 2016, and TPC members in the conferences including: INFOCOM 2014’2015’2016’2017, ICDCS 2015’2017’2018, Middleware 2017, ACM e-Energy 2017, SIES 2013, RTCSA 2012’2013 and ICPADS 2012 etc. He is a Senior Member of IEEE.

•Abstract: The cloud provides low-cost and flexible IT resources (hardware and software) across the Internet. As more cloud providers seek to drive greater business outcomes and the environments of the cloud become more complicated, it is evident that the era of the intelligent cloud has arrived. The intelligent cloud faces several challenges, including optimizing the economic cloud service configuration and adaptively allocating resources. In particular, there is a growing trend toward using machine learning to improve the intelligence of cloud management. This talk discusses an architecture of intelligent cloud resource management with reinforcement learning. The reinforcement learning makes clouds automatically and efficiently negotiate the most appropriate configuration, directly from complicated cloud environments.

 

 

 

Dr. Insik Shin

•Bio:Dr.Shin Insik Shin is an associate professor in the Department of Computer Science at KAIST, Korea. He received a Ph.D. degree from the University of Pennsylvania, USA, an MS degree from Stanford University, USA, and a BS degree from Korea University, Korea, all in Computer (& Information) Science. Prior to joining KAIST in 2008, he has been a post-doctoral research fellow at Malardalen University, Sweden, and a visiting scholar at University of Illinois at Urbana-Champaign, USA. His research interests include real-time embedded systems, systems security, mobile computing, and cyber-physical systems. He serves on program committees of top international conferences, including RTSS, RTAS and ECRTS. He is a recipient of several best (student) paper awards, including RTSS ’03, RTAS ’12, and RTSS ’12, KAIST Excellence Award, and Naver Young Faculty Award.

•Abstract: In recent years, the explosion of diverse smart devices such as mobile phones, TVs, watches, and even cars, has completely changed our life. We do communicate with friends through social network services (SNSs) whenever we want, buy stuff without visiting shops, and enjoy multimedia wherever we are. Thanks to these devices. However, the smart devices cannot simply interact with each other even though they are right next to each other. For example, when you want to read a PDF stored on a smartphone on a larger TV screen, you need to do complicated works or plug a bunch of cables. In this work, we introduce M+, an extension of Android that supports cross-device functionality sharing in a transparent manner. As a platform-level solution, M+ enables unmodified Android applications to utilize not only application functionalities but also system functionalities across devices, as if they were to utilize them inside the same device. In addition to secure connection setup, M+ also allows to perform permission checks for remote applications in the same way as for local. Our experiment results show that M+ enables transparent cross-device sharing for various functionalities and achieves performance close to that of within-device sharing unless a large amount of data is transferred.

 

 

 

Dr. Jong-Chan Kim

•Bio:Dr.Kim Professor Jong-Chan Kim received the BS, MS and PhD degrees in the Department of Computer Science and Engineering from Seoul National University, Korea, in 1999, 2001, and 2013, respectively. Currently, he is working as an associate professor in the Department of Automobile and IT Convergence, Kookmin University. Previously, from Sept. 2013 to Feb. 2014, he was a research fellow at the Institute of Computer Technology, Seoul National University. He was also a visiting scholar at the Department of Electrical Engineering and Computer Science, University of California, Irvine, from Mar. 2011 to Nov. 2011. Besides his academic career, he also had more than 8 years of industry experience at TmaxSoft, where he served as a software developer developing various system software products which are being used across various industry domains.

•Abstract: Automobile control systems should be designed for optimal control performance through efficiently utilizing its underlying hardware resources like CPU. For this purpose, lots of real-time scheduling and system optimization methods have been developed. However, most of these researches assume that the unit of software is a real-time task and its period and deadline is freely adjustable. However, in practice, AUTOSAR, the de-facto standard software architecture, organizes an automobile control system as a collection of runnables, which is much smaller unit of functions compared to task. Moreover, sensing to actuation control loop is composed of DAG (Directed Acyclic Graph) of a significant number of runnables, which makes end-to-end delay analysis more complex. In this talk, we present a runnable scheduling method for trading CPU utilization for maximizing the control performance of complex automobile control systems. Our main idea is to transform existing task-based control-scheduling codesign methods to runnable-based algorithm, which can be practically applied to AUTOSAR-based control systems.

 

 

 

Dr. Yongsoon Eun

•Bio:Dr.Eun Yongsoon Eun received BA in mathematics, BSE and MSE in Control and Instrumentation Engineering from Seoul National University and PhD in Electrical Engineering from the University of Michigan. He worked as a senior research scientist at Xerox Corporation Research Center in Webster, NY, USA from 2003 to 2012 before joined DGIST Information and Communication Engineering Department as an associate professor. He is currently the director of CPS Global Center and also the director of DGIST Resilient Cyber-Physical Systems Research Center. His research interests include control systems with nonlinear sensors and actuators, geometric control of quadrotors, communication network, and resilient cyber-physical systems.

•Abstract: This article presents an attack-resilient architecture of cyber-physical systems (CPS). Then, as a case study, we build a radio-based train control testbed and validate the proposed resilient design architecture. Our target CPS application is a hierarchical control system, which consists of a set of physical systems equipped with local embedded controllers, a supervision module that manages high-level operation of physical systems, and computer network connecting each physical system to the supervision module. The architecture includes mechanisms for attack and fault resiliency on each component of the hierarchical control systems, i.e., physical systems, embedded controllers, and network. We investigate the efficacy of the proposed resilient architecture in a train control testbed under various safety critical scenarios. The testbed includes a commercial train control and supervision software and reflects actual systems closely. By experiments on the testbed, we empirically validate the resilience of the proposed architecture under attacks on sensors, embedded controllers, and networks.

 

 

 

Dr. Kyoung-Dae Kim

•Bio:Dr.KDKim Dr. Kim received his Ph.D. degree in electrical and computer engineering from the University of Illinois at Urbana-Champaign, USA, in 2011. Currently, he is an Assistant Professor in the Information & Communication Engineering at DGIST. Prior to join the DGIST, he was an Assistant Professor in the Department of Electrical & Computer Engineering at the University of Denver, USA. Also, he was a Postdoctoral Research Associate in the Department of electrical and computer engineering, Texas A&M University, USA. His research interest is developing theories, tools, and software frameworks to improve reliability and autonomy of cyber-physical systems and their application to real systems such as smart transportation systems, collaborative robotic systems, etc.

•Abstract: In this talk, an optimization-based approach for safe and efficient intersection crossing traffic management under autonomous and connected ground traffic environment is presented. The proposed algorithm, named MICA (Mixed integer programming based Intersection Coordination Algorithm), generates the fastest intersection crossing discrete-time trajectory for each vehicle approaching an intersection. Constraints are carefully designed and incorporated into the optimization process to avoid collisions while crossing an intersection. The performance of the proposed MICA is evaluated through extensive simulations using a microscopic traffic simulator, SUMO. The simulation results show that MICA performs substantially better in terms of the traffic throughput compared to both an optimized traffic light mechanism and DICA which is an intersection control algorithm proposed in our earlier work.

 

 

 

Dr. Daehoon Kim

•Bio:Dr.DHKim Daehoon Kim is an assistant professor at Daegu Gyeongbuk Institute of Science and Technology (DGIST). Prior to joining DGIST, he worked at University of Illinois, Urbana-Champaign and University of Wisconsin, Madison as a postdoctoral research associate. He received the BS degree in computer science from Yonsei University in 2008, and the PhD in computer science from KAIST in 2014. He received the best paper award from IEEE computer architecture letters in 2014. His research interests include computer architecture, operating systems, virtualization, and computer system security.

•Abstract: Cache side-channel attacks enable unauthorized attackers to extract keys of encryption algorithms on multi-core processors. This can be one of major threats to Cyber-Physical Systems since attackers can forge critical information of physical systems using the extracted keys, such as location and velocity of vehicles. In this talk, we introduce two representative cache side-channel attacks, “Flush&Reload” and “Prime&Probe”, exploiting vulnerability of multi-core processors when physical cores share the last-level cache (LLC), and specific attack scenarios in Cyber-Physical Systems. Furthermore, we show how to extract keys of encryption algorithms by demonstrating the cache side channel attack on our multi-core processors.